cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 28 Documents
Search results for , issue "Vol 12, No 3: September 2014" : 28 Documents clear
One-Time Password Implementation on Lego Mindstorms NXT Barlian Henryranu P; Heru Nurwarsito; Wijaya Kurniawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.92

Abstract

One of the factors that affect the security of a network or system is user authentication and unfortunately at times it can be said not safe anymore. Brute force attacks on password systems are dominant (static) potential to penetrate network security or user authentication system. One way to overcome these drawbacks is to use the One Time Password (OTP) algorithm. OTP is a password security system using dynamic passwords. The password will be valid only for a session only, and so want to get into the next session, the password will be changed to the sequence/combination in accordance with certain rules or randomly determined by the user. In this research, author will be analyzed how the reliability of the OTP algorithm by applying it to a LEGO Mindstorm robot. The robot will be designed into a system where the user will be safe to enter the default password then the system will change the password every session. The results of the questionnaire showed that 81% users feel more secure, but more 60% said difficult to do because the user must perform the calculations in advance to enter the password.
Single Stage RF Amplifier with High Gain for 2.4GHz Receiver Front-Ends Achmad Munir; Biru Tutur Ranum
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.100

Abstract

The paper deals with the numerical and experimental development of single stage radio frequency (RF) amplifier with high gain for 2.4GHz receiver front-ends. The work is motivated by the increasing demand of high-gain receiver amplifier in low-cost especially for wireless local area network (WLAN) application. Prior hardware realization and experimental characterization, the proposed amplifier which uses a single RF transistor of BFP420 type is numerically designed using ADS® software to satisfy the required specification. To obtain the impedance matching at ports of amplifier, microstrip lines are employed at the input and output ports. The prototype of amplifier is realized by use of a dielectric substrate of glass-reinforced epoxy lamination (FR4) board which has thickness of 0.762mm and relative permittivity of 4.3. The prototype is then experimentally characterized and demonstrates the gain of 13.35dB at frequency of 2.4GHz with the noise figure of 3.33dB, the input and output voltage standing wave ratio (VSWR) of 2.08 and 2.55, respectively.
The Implementation of Henon Map Algorithm for Digital Image Encryption Edi Sukirman; Suryadi MT; M. Agus Mubarak
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.83

Abstract

Security information is a very important aspect that must be noticed. Information not only in the form of text but also in form of data image. Using data encription to send private information have been widely use. But still need to improve the endurance from bruto force attack. One ways to improve it, is by using chaos theory with henom algorithm. Test result gave the alghoritm can encrypt image data from grayscale type to colorfull type. Encryption and descryption time proportional to the size image. Composition and variety coulor doesn’t effect the time. This algorithm has key space of  and key sensitivity up to . So, it can be concluded that, the algorithm is very difficult to be cracked by brute force attack.
An Alternative Method for Determining Critical Success Factors of Information System Project A'ang Subiyakto; Abdul Rahman Ahlan; Husni Teja Sukmana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.105

Abstract

Historically, scholars have been determining deductively critical success factors (CSFs) since the end 1970s. Meanwhile, most of researchers in the information system (IS) project performance studies have been performing inductively this process. Definitely, each of both methods has strengths and weaknesses, but we argue that researchers and practitioners will get an alternative choice if both methods are combined for sharing the caracteristics. This study is conducted to respond this issue. Authors combined both methods using a compatibility analysis to inprove the result validity. This paper contributes to the debates on ensuring the interrelationship between the project succes criteria and their CSFs, incorporating the new factors, decomposing complexity of the project, and understanding focus of the stakeholders in the IS project environment. Although, the proposed method is only a combination of both previous methods, but this proposition is proposed together with a case study to prove its implementation feasibility
Application Status of the Barkhausen Effect in Nondestructive Testing Yuan Huijuan; Zhang Enjing; Li Hongmei; Fu Jian; Yang Ying Ying; Zou Ying; Hu Dandan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.96

Abstract

Change of internal structure or internal defect in ferromagnetic materials can produce change in Barkhausen noise, and by using Barkhausen noise signal measurement, the quality and internal defects of the material can be judged. The nondestructive testing technology is based on the Barkhausen effect, it gets the attention because of its advantages, such as rapid, non-destructive, mensurable, mainly used to detect stress, hardness, grain size, grinding burn etc.. The research status of Barkhausen effect in nondestructive testing was reviewed. Its application situation was investigated that the nondestructive testing technology based on the Barkhausen effect on stress, hardness, grain size, grinding burn detection etc., and the relationship between the MBN signals and stress, hardness, grain size, grinding burn were showed. 
A Novel Part-of-Speech Set Developing Method for Statistical Machine Translation Herry Sujaini; Kuspriyanto Kuspriyanto; Arry Akhmad Arman; Ayu Purwarianti
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.79

Abstract

Part of speech (PoS) is one of the features that can be used to improve the quality of statistical-based machine translation. Typically, the language PoS determined based grammar of the language or adopt from other languages PoS. This work aims to formulate a model to developing PoS as linguistic factors to improve the quality of machine translation automatically. The research method using word similarity approach, where we perform clustering of the words contained in a corpus. Further classes will be defined as PoS set obtained for a given language.We evaluated the results of the PoS that defined computational results using machine translation system MOSES as the system by comparing the results of the SMT are using PoS sets generated manually, while the assessment of the system using BLEU method. Language that will be used for evaluation is English as the source language and Indonesian as the target language.
Quantized Feedback Control of Network Empowerment Ammunition with Data-Rate Limitations Fang Jin; Zhi-hua Yuan; Qing-Quan Liu; Zhang Xing
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.125

Abstract

This paper investigates quantized feedback control problems for network empowerment ammunition, where the sensors and the controller are connected by a digital communication network with data-rate limitations. Different from the existing ones, a new bit-allocation algorithm on the basis of the singular values of the plant matrix is proposed to encode the plant states. A lower bound on the data rate is presented to ensure stabilization of the unstable plant. It is shown in our results that, the algorithm can be employed for the more general case. An illustrative example is given to demonstrate the effectiveness of the proposed algorithm.
Design Concept of Dynamic-Adaptive Reconfigurable Wireless Sensor Node (DARWiSeN) C. Bambang Dwi Kuncoro; M. Anda Falahuddin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.98

Abstract

This paper describe the proposed design concept of wireless sensor node named Dynamic-Adaptive Reconfigurable Wireless Sensor Node (DARWiSeN), with special emphasis on the design principles and functionality. The design concept is targeted to a wireless sensor node prototype that has ability to adapt various applications and situation with a minimal redesign effort through concept of reconfigurable hardware and modularity approach. Both the hardware and software components are detailed, together with experimental evaluation. The experimental evaluation revealed that this approach is not only capable to show rapid prototype of wireless sensor application design, but it can also be used as a generic wireless node platform design in dynamic-adaptive reconfigurable feature, flexible, and greatly extending its applicability.

Page 3 of 3 | Total Record : 28


Filter by Year

2014 2014


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue